Michael Cobb CISSP-ISSAP Security What are new and commonly used public-key cryptography algorithms? 28 Aug 2009 Security What are the export limitations for AES data encryption? 25 Aug 2009 Security How does a Web server model differ from an application server model? 11 Feb 2009 Security Is it impossible to successfully remove a rootkit? 21 Oct 2008 Security Is Triple DES a more secure encryption scheme than DUKPT? 27 Mar 2008 Security Preparing for uniform resource identifier (URI) exploits 11 Oct 2007 Security How to avoid dangling pointers: Tiny programming errors leave serious security vulnerabilities 13 Sep 2007 Security How does SSL 'sit' between the network layer and application layer? 31 Jul 2007 Security How secure is the Windows registry? 26 Jul 2007 Security What are the drawbacks to application firewalls? 31 May 2007 Security What should be done with a RAID-5 array's failed drives? 31 May 2007 Security How secure are document scanners and other 'scan to email' appliances? 30 May 2007 Security How can header information track down an email spoofer? 02 May 2007 Security Will two different operating systems cause administrative problems? 17 Jan 2007 1 2 3 4